Behavioral task
behavioral1
Sample
ea77c873bbaa2aa2113aacf381087d6add0b385a6a320ed9d7f57bfdd1e1d424.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ea77c873bbaa2aa2113aacf381087d6add0b385a6a320ed9d7f57bfdd1e1d424.xls
Resource
win10v2004-20250217-en
General
-
Target
ea77c873bbaa2aa2113aacf381087d6add0b385a6a320ed9d7f57bfdd1e1d424
-
Size
349KB
-
MD5
1a9477a93774d7a5e55ff8f1e1055295
-
SHA1
04e30ea7a0222dee24ea1c213eb85f76c3c545c2
-
SHA256
ea77c873bbaa2aa2113aacf381087d6add0b385a6a320ed9d7f57bfdd1e1d424
-
SHA512
e97f2b1bb1cf1b4912c7cac4ca6e397a9a85456e720f86db5b397a87eed8053d85102ef382c231df9facb695bfc6a78cd53d4b5e684c0769fdd3cd2ca234b9e5
-
SSDEEP
6144:kxEtjPOtioVjZUGGnwfDlavx+/xoY4GPOJ4LNm3pRFd+20vS2e2AZPhFZtlSbXo:fpTdNt2f83u4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource yara_rule sample office_xlm_macros
Files
-
ea77c873bbaa2aa2113aacf381087d6add0b385a6a320ed9d7f57bfdd1e1d424.xls windows office2003
Kangatang
ThisWorkbook
Sheet1
Sheet2
Sheet3
Sheet4
Sheet5
Sheet6